Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 17 Sep 1999 16:12:24 -0400
From:      Keith Stevenson <k.stevenson@louisville.edu>
To:        freebsd-security@freebsd.org
Subject:   Re: CERT amd advisory
Message-ID:  <19990917161224.A5524@homer.louisville.edu>
In-Reply-To: <Pine.BSF.4.10.9909171337410.35608-100000@dt014nb6.san.rr.com>; from Doug on Fri, Sep 17, 1999 at 01:42:06PM -0700
References:  <Pine.BSF.4.10.9909171337410.35608-100000@dt014nb6.san.rr.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, Sep 17, 1999 at 01:42:06PM -0700, Doug wrote:
> 	INRE CERT Advisory CA-99.12 - Buffer Overflow in amd, I'm
> wondering if it's being contemplated to MFC the recent update to amd (to
> the non-vulnerable version) prior to 3.3-Release CD's being cut? I know
> it's a big change, but I think it might be worth it. Also, FYI the URL for
> the FreeBSD advisory on this topic doesn't seem to be on the FTP site yet. 

I seem to recall the 3.3 Release Notes stating that this problem was fixed.

-- 
Keith Stevenson
System Programmer - Data Center Services - University of Louisville
k.stevenson@louisville.edu
PGP key fingerprint =  4B 29 A8 95 A8 82 EA A2  29 CE 68 DE FC EE B6 A0


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19990917161224.A5524>